Search Results - (( based application testing algorithm ) OR ( mobile applications force algorithm ))*
Search alternatives:
- application testing »
- mobile applications »
- applications force »
- based application »
- testing algorithm »
- force algorithm »
-
1
Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model
Published 2022“…Although there are algorithms reported for agent-based mobile crowd simulations, not many studies have adopted the social notion during mobile crowd steering simulations. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
-
6
-
7
Node placement strategy in wireless sensor network
Published 2013“…Node placement influences the target position, coverage area, and connectivity in sensor networks.In random deployment, sensor nodes are deployed randomly in a non-invasive way.The deployment process may cause issues like coverage holes, overlapping, and connectivity failure.Enhancing coverage and connectivity are important for sensor networks to provide a reliable communication within sensing.Placing many sensor nodes in a WSN application region area is not the best solution due to cost and it results in multiple sensors used.Mobile sensor node is used as an alternative to overcome the random deployment problem.The virtual force based self node deployment is used in the mobility sensor to improve the coverage and connectivity area.Virtual Force Algorithm (VFA) approach using virtual repulsive and attractive forces is used to find the optimal node placement to minimize the problems. …”
Get full text
Get full text
Article -
8
Wheeled Mobile Robot Path Control in a Complex Trajectory using HybridMethods
Published 2015Get full text
Get full text
Get full text
Book Chapter -
9
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Artificial Intelligence Integration in Mobile Applications: Innovation and Challenges in Supporting Quran Memorization and Review
Published 2025journal::journal article -
13
Review on real-time control schemes for wheeled mobile robot
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Gps solution for active queue management using android platform
Published 2021“…Since queueing in different locations is considered as a optimisation problem, several algorithms are reviewed to tackle the problem, such as brute force method, nearest neighbour algorithm, and branch and bound algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…In order to identify the strength and weakness of these algorithms for MC/DC compliant test cases, this research proposes an experimental study involving four neighborhoods based meta-heuristic algorithms. …”
Get full text
Get full text
Thesis -
17
Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Test suite generation based on hybrid flower pollination algorithm and hill climbing
Published 2021“…One of the common application of search-based software testing (SBST) is generating test cases for all objectives characterized by a scope model (e.g. articulations, mutants, branches). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
20
